Lightweight cryptographic protocols for IoT-constrained devices: A survey MN Khan, A Rao, S Camtepe IEEE Internet of Things Journal 8 (6), 4132-4156, 2020 | 89 | 2020 |
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study L Sun, S Versteeg, S Boztas, A Rao arXiv preprint arXiv:1609.06676, 2016 | 88 | 2016 |
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses T Tam, A Rao, J Hall Computers & Security 109, 102385, 2021 | 84 | 2021 |
Cocyclic Hadamard matrices over Z_t x Z^2_2 A Baliga, KJ Horadam Australasian Journal of Combinatorics 51, 123-134, 1995 | 75 | 1995 |
A family of two-weight irreducible cyclic codes A Rao, N Pinnawala IEEE Transactions on Information Theory 56 (6), 2568-2570, 2010 | 34 | 2010 |
New self-dual codes from cocyclic Hadamard matrices A Baliga Journal of Combinatorial Mathematics and Combinatorial Computing 28, 7-14, 1998 | 31 | 1998 |
Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient J Liebig, A Rao Signal-Image Technology and Internet-Based Systems (SITIS), 2014 Tenth …, 2014 | 28* | 2014 |
Using shortest path to discover criminal community P Magalingam, S Davis, A Rao Digital Investigations 15, 1-17 doi:10.1016/j.diin.2015.08.0, 2015 | 25 | 2015 |
Cocyclic simplex codes of type α over Z_4 and Z_{2^s} N Pinnawala, A Rao Information Theory, IEEE Transactions on 50 (9), 2165-2169, 2004 | 25* | 2004 |
Fast extraction of the backbone of projected bipartite networks to aid community detection J Liebig, A Rao Europhysics Letters 113 (2), 28003, 2016 | 22 | 2016 |
Fault detection and identification—a filter investigation R Khan, P Williams, P Riseborough, A Rao, R Hill International Journal of Robust and Nonlinear Control 28 (5), 1852-1870, 2018 | 21* | 2018 |
Balancing sets of non-binary vectors A Baliga, S Boztas Proceedings IEEE International Symposium on Information Theory,, 300, 2002 | 16 | 2002 |
The invisible COVID-19 small business risks: Dealing with the cyber-security aftermath T Tam, A Rao, J Hall Digital Government: Research and Practice 2 (2), 1-8, 2020 | 15 | 2020 |
Self-dual codes using image restoration techniques A Baliga, J Chua Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 14th …, 2001 | 15 | 2001 |
Identifying a criminal’s network of trust P Magalingam, A Rao, S Davis 2014 International Conference on Signa-Image Technology & Internet-Based …, 2014 | 14 | 2014 |
Comparative study of post-impact motion control of a flexible arm space robot S Kayastha, J Katupitiya, G Pearce, A Rao European Journal of Control 69, 100738, 2023 | 13 | 2023 |
Difference covering arrays and pseudo-orthogonal latin squares F Demirkale, D Donovan, J Hall, A Khodkar, A Rao Graphs and Combinatorics 32, 1353-1374, 2016 | 13 | 2016 |
Active fault tolerant flight control system design R Khan, P Williams, P Riseborough, A Rao, R Hill arXiv preprint arXiv:1610.02139, 2016 | 10 | 2016 |
Mutually orthogonal Latin squares from the inner products of vectors in mutually unbiased bases JL Hall, A Rao Journal of Physics A: Mathematical and Theoretical 43 (13), 135302, 2010 | 9 | 2010 |
New linear codes over Z_{p^s} via the trace map A Rao, N Pinnawala Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on …, 2005 | 9* | 2005 |